- Create users using the CREATE USER command, for example MySQL: CREATE USER 'new_user'@'host' IDENTIFIED BY 'password'; PostgreSQL: CREATE USER new_user WITH PASSWORD 'password'; 2. Grant permissions to use the GRANT command, such as GRANT SELECT ON database_name. TO 'new_user'@'host'; 3. Revoke permissions to use the REVOKE command, such as REVOKE DELETE ON database_name. FROM 'new_user'@'host'; 4. Delete users using the DROP USER command; 5. Permission management is recommended to follow the principle of minimum permissions, regularly review permissions, and use roles to simplify management. After the operation is completed, it is recommended to refresh the permissions to ensure that they take effect and pay attention to the impact of permission changes on the system.
Creating a user and granting permissions in SQL is the basic operation in database management. Whether for team collaboration or system security, permissions need to be reasonably allocated according to actual needs. The following are some common scenarios to operate.

Common ways to create users
Different database systems (such as MySQL, PostgreSQL, and SQL Server) have slightly different syntax, but the basic logic is similar.
Taking MySQL as an example, the basic commands for creating a user are as follows:

CREATE USER 'new_user'@'host' IDENTIFIED BY 'password';
-
new_user
is the user name you want to create; -
host
indicates which host the user can connect from, usually usinglocalhost
or%
(represents any host); -
password
is the login password.
If you are using PostgreSQL, the command will be:
CREATE USER new_user WITH PASSWORD 'password';
Several common types of granting permissions
After creating a user, the next step is to authorize. You can grant different permission types as needed, such as:

-
SELECT
: Allows reading of data; -
INSERT
: Allows insertion of new records; -
UPDATE
: Allows update of existing data; -
DELETE
: Allows deletion of data; -
ALL PRIVILEGES
: All permissions.
For example, in MySQL, a user is granted query permissions to all tables under a database:
GRANT SELECT ON database_name.* TO 'new_user'@'host';
After executing the authorization statement, it is recommended to run:
FLUSH PRIVILEGES;
Ensure permissions take effect immediately.
How to revoke or modify permissions
If the user no longer needs some permissions, you can use the REVOKE
command to reclaim the permissions. For example:
REVOKE DELETE ON database_name.* FROM 'new_user'@'host';
If you want to completely delete the user:
DROP USER 'new_user'@'host';
Note: When revoking permission, you must confirm whether it affects other functions or applications that rely on this permission.
Some practical suggestions for permission management
Minimum permission principle : only the minimum permissions required to complete tasks are granted to avoid abuse of
ALL PRIVILEGES
;Regular review of authority : especially in a multi-person collaboration environment to prevent authority from getting out of control;
Use roles to simplify management (for PostgreSQL and some supported roles databases):
CREATE ROLE data_reader; GRANT SELECT ON ALL TABLES IN SCHEMA public TO data_reader; GRANT data_reader TO new_user;
This will make permissions more centralized and easier to maintain.
Basically, this is all. Creating users and authorization is not complicated, but details are easy to ignore, such as host name, refresh permissions, permission recycling and other links. Just be careful when operating.
The above is the detailed content of How to create a user and grant permissions in SQL. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

In database design, use the CREATETABLE statement to define table structures and constraints to ensure data integrity. 1. Each table needs to specify the field, data type and primary key, such as user_idINTPRIMARYKEY; 2. Add NOTNULL, UNIQUE, DEFAULT and other constraints to improve data consistency, such as emailVARCHAR(255)NOTNULLUNIQUE; 3. Use FOREIGNKEY to establish the relationship between tables, such as orders table references the primary key of the users table through user_id.

SQLfunctionsandstoredproceduresdifferinpurpose,returnbehavior,callingcontext,andsecurity.1.Functionsreturnasinglevalueortableandareusedforcomputationswithinqueries,whileproceduresperformcomplexoperationsanddatamodifications.2.Functionsmustreturnavalu

Pattern matching functions in SQL include LIKE operator and REGEXP regular expression matching. 1. The LIKE operator uses wildcards '%' and '_' to perform pattern matching at basic and specific locations. 2.REGEXP is used for more complex string matching, such as the extraction of email formats and log error messages. Pattern matching is very useful in data analysis and processing, but attention should be paid to query performance issues.

LAG and LEAD in SQL are window functions used to compare the current row with the previous row data. 1. LAG (column, offset, default) is used to obtain the data of the offset line before the current line. The default value is 1. If there is no previous line, the default is returned; 2. LEAD (column, offset, default) is used to obtain the subsequent line. They are often used in time series analysis, such as calculating sales changes, user behavior intervals, etc. For example, obtain the sales of the previous day through LAG (sales, 1, 0) and calculate the difference and growth rate; obtain the next visit time through LEAD (visit_date) and calculate the number of days between them in combination with DATEDIFF;

To find columns with specific names in SQL databases, it can be achieved through system information schema or the database comes with its own metadata table. 1. Use INFORMATION_SCHEMA.COLUMNS query is suitable for most SQL databases, such as MySQL, PostgreSQL and SQLServer, and matches through SELECTTABLE_NAME, COLUMN_NAME and combined with WHERECOLUMN_NAMELIKE or =; 2. Specific databases can query system tables or views, such as SQLServer uses sys.columns to combine sys.tables for JOIN query, PostgreSQL can be used through inf

Backing up and restoring SQL databases is a key operation to prevent data loss and system failure. 1. Use SSMS to visually back up the database, select complete and differential backup types and set a secure path; 2. Use T-SQL commands to achieve flexible backups, supporting automation and remote execution; 3. Recovering the database can be completed through SSMS or RESTOREDATABASE commands, and use WITHREPLACE and SINGLE_USER modes if necessary; 4. Pay attention to permission configuration, path access, avoid overwriting the production environment and verifying backup integrity. Mastering these methods can effectively ensure data security and business continuity.

Create a user using the CREATEUSER command, for example, MySQL: CREATEUSER'new_user'@'host'IDENTIFIEDBY'password'; PostgreSQL: CREATEUSERnew_userWITHPASSWORD'password'; 2. Grant permission to use the GRANT command, such as GRANTSELECTONdatabase_name.TO'new_user'@'host'; 3. Revoke permission to use the REVOKE command, such as REVOKEDELETEONdatabase_name.FROM'new_user

TheSQLLIKEoperatorisusedforpatternmatchinginSQLqueries,allowingsearchesforspecifiedpatternsincolumns.Ituseswildcardslike'%'forzeroormorecharactersand'_'forasinglecharacter.Here'showtouseiteffectively:1)UseLIKEwithwildcardstofindpatterns,e.g.,'J%'forn
